2018 IEEE 9th International Conference on Software Engineering and Service Science (ICSESS) 2018
DOI: 10.1109/icsess.2018.8663708
|View full text |Cite
|
Sign up to set email alerts
|

Scalable Source Code Plagiarism Detection Using Source Code Vectors Clustering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…The last phase deals with obtaining individual matches from the database and their evaluation. In this phase, before the actual generation of the report, a filter of non-significant matches can be included which serves to clarify the reports [30]. In the filter, it is possible to define patterns that will not be taken into account in the evaluationfor example, commands for importing packages, generated commands and others.…”
Section: Figure 1 Structure Of the Designed Systemmentioning
confidence: 99%
See 3 more Smart Citations
“…The last phase deals with obtaining individual matches from the database and their evaluation. In this phase, before the actual generation of the report, a filter of non-significant matches can be included which serves to clarify the reports [30]. In the filter, it is possible to define patterns that will not be taken into account in the evaluationfor example, commands for importing packages, generated commands and others.…”
Section: Figure 1 Structure Of the Designed Systemmentioning
confidence: 99%
“…Finally, we designed a method of data persistence [30] based on clustering using a relational databasesee FIGURE 9. When dealing with data persistence, we also dealt with the efficiency of the search in this data structure.…”
Section: Figure 8 Incremental Clustering Schemementioning
confidence: 99%
See 2 more Smart Citations
“…In code plagiarism detection, various methods and algorithms are used, including Token [12], Graph [13], Attribute [14], and Structure-based Detection [15]. Furthermore, structure or Parse-based Detection, used to generate Abstract Syntax Trees (AST), is suitable for identifying code plagiarism because it accurately represents the structure [16]. AST is also considered effective in identifying attempts to avoid detection systems, such as variable renaming, adding comments, and function rearrangement.…”
Section: Introductionmentioning
confidence: 99%